• Title/Summary/Keyword: access structure

Search Result 1,312, Processing Time 0.022 seconds

Electrical characteristic of Phase-change Random Access Memory with improved bottom electrode structure (하부전극 구조 개선에 의한 상변화 메모리의 전기적 특성)

  • Kim, Hyun-Koo;Choi, Hyuk;Cho, Won-Ju;Chung, Hong-Bay
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.69-70
    • /
    • 2006
  • A detailed Investigation of cell structure and electrical characteristic in chalcogenide-based phase-change random access memory(PRAM) devices is presented. We used compound of Ge-Sb-Te material for phase-change cell. A novel bottom electrode structure and manufacture are described. We used heat radiator structure for improved reset characteristic. A resistance change measurement is performed on the test chip. From the resistance change, we could observe faster reset characteristic.

  • PDF

Application of access control policy in ScienceDMZ-based network configuration (ScienceDMZ 기반의 네트워크 구성에서 접근제어정책 적용)

  • Kwon, Woo Chang;Lee, Jae Kwang;Kim, Ki Hyeon
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.3-10
    • /
    • 2021
  • Nowadays, data-based scientific research is a trend, and the transmission of large amounts of data has a great influence on research productivity. To solve this problem, a separate network structure for transmitting large-scale scientific big data is required. ScienceDMZ is a network structure designed to transmit such scientific big data. In such a network configuration, it is essential to establish an access control list(ACL) for users and resources. In this paper, we describe the R&E Together project and the network structure implemented in the actual ScienceDMZ network structure, and define users and services to which access control policies are applied for safe data transmission and service provision. In addition, it presents a method for the network administrator to apply the access control policy to all network resources and users collectively, and through this, it was possible to achieve automation of the application of the access control policy.

A Study on the Intellectual Structure of Domestic Open Access Area (국내 오픈액세스 분야의 지적구조 분석에 관한 연구)

  • Shin, Jueun;Kim, Seonghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.2
    • /
    • pp.147-178
    • /
    • 2021
  • In this study, co-word analysis was conducted to investigate the intellectual structure of the domestic open access area. Through KCI and RISS, 124 research articles related to open access in Korea were selected for analysis, and a total of 1,157 keywords were extracted from the title and abstract. Network analysis was performed on the selected keywords. As a result, 3 domains and 20 clusters were extracted, and intellectual relations among keywords from open access area were visualized through PFnet. The centrality analysis of weighted networks was used to identify the core keywords in this area. Finally, 5 clusters from cluster analysis were displayed on a multidimensional scaling map, and the intellectual structure was proposed based on the correlation between keywords. The results of this study can visually identify and can be used as basic data for predicting the future direction of open access research in Korea.

Access Control Method and Key Management Method for H.264/SVC (H.264/SVC에 대한 접근 제어 방법 및 키 관리 방법)

  • Cho, Tae-Nam;Yong, Seung-Lim
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.415-426
    • /
    • 2010
  • CAS is an access control system by which only legal users can access contents. IPTV is a spotlighted system that uses CAS. H.264/SVC is a coding standard that provides a scalable coding method by which users who are in various network environments and have various devices can receive the contents. In this method, the contents are coded in a layered structure to make users choose the quality of the receiving contents. Therefore, contents provider should be able to control users to access only appropriate contents according to their subscriptions. The structure of CAS being employed in many applications is not suitable to control access for H.264/SVC. In this paper, we provide an efficient access control method and a key management method for H.264/SVC contents using CAS.

An Efficient Index Structure Supporting Structure Queries for Video Documents (비디오 문서의 구조 질의를 위한 효율적 인덱스 구조)

  • Lee, Yong-Kyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1109-1118
    • /
    • 1998
  • Recently, much attention has been focused on video databases. Video documents also have a hierarchical logical structure like text documents. By exploiting this structure using structure queries, users can obtain greater benefits than by using only content queries. In order to process structure queries efficiently, an index structure supporting fast video element access must be provided. However, there has been little attention to the index structure for video documents. In this paper, we present a tree-structured video document model and a new inverted index structure for video documents. We evaluate the storage requirement and the disk access time of the scheme and present the analytical results.

  • PDF

Wireless Access Network Virtualization Based on Distributed Antenna Systems (분산 안테나 시스템에 기반한 무선 액세스망 가상화)

  • Kim, Su Min;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2085-2094
    • /
    • 2012
  • In this paper, we propose a wireless access network virtualization algorithm based on a digital unit (DU)-radio unit (RU) separated network structure in a cellular network with multiple radio access technologies (RATs). The proposed wireless access network virtualization algorithm consists of a baseline access network virtualization, RAT virtualization, and access path migration algorithms. Final wireless access network virtualization is performed by sequentially performing these procedures. Through system-level simulations which assume 3GPP LTE and WiMAX systems, the performance of the proposed wireless access network virtualization is evaluated in terms of system throughput for two scenarios according to asymmetry of network traffic load. Numerical results show that our proposed wireless access network virtualization algorithm achieves significant system throughput gain even in asymmetric traffic load and user distribution situations.

Variable latency L1 data cache architecture design in multi-core processor under process variation

  • Kong, Joonho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.1-10
    • /
    • 2015
  • In this paper, we propose a new variable latency L1 data cache architecture for multi-core processors. Our proposed architecture extends the traditional variable latency cache to be geared toward the multi-core processors. We added a specialized data structure for recording the latency of the L1 data cache. Depending on the added latency to the L1 data cache, the value stored to the data structure is determined. It also tracks the remaining cycles of the L1 data cache which notifies data arrival to the reservation station in the core. As in the variable latency cache of the single-core architecture, our proposed architecture flexibly extends the cache access cycles considering process variation. The proposed cache architecture can reduce yield losses incurred by L1 cache access time failures to nearly 0%. Moreover, we quantitatively evaluate performance, power, energy consumption, power-delay product, and energy-delay product when increasing the number of cache access cycles.

A Procedure for a Strength Assessment of Permanent Means of Access Structure (Permanent Means of Access 강도 평가 방법에 대한 연구)

  • Jang, Beom-Seon;Chung, Sung-Wook;Ko, Dae-En;Chun, Min-Sung;Kim, Ji-Young
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.1
    • /
    • pp.31-42
    • /
    • 2009
  • Common structural rule (CSR) doesn' t provide any other specific regulations for permanent means of access (PMA) platform structure in a cargo oil tank. The PMA platform is recommended to comply with scantling requirement of local support member. However, it leads to too conservative scantlings compared with actual loads imposed on the platform. This paper proposes a strength assessment procedure for the PMA structure based on a nonlinear ultimate strength. The ultimate strength is evaluated in a sufficiently conservative way. The first linear buckling mode is used as an initial imperfection shape and its magnitude is determined using the definitions of DNV PULS. Since the same imperfection mode as the failure mode of the ultimate limit state is assumed, it can accelerate the failure. Au ultimate strength capacity curve obtained from a series of nonlinear FE analysis is compared with actual stresses calculated by CSR cargo hold analysis.

Wireless Access Network Architecture and Virtualization Scenarios for Next-Generation Mobile Communication Networks (차세대 이동통신 네트워크를 위한 무선 액세스 망 구조 및 가상화 시나리오)

  • Kim, Myunghwan;Kim, Su Min;Jung, Bang Chul;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2150-2162
    • /
    • 2012
  • In accordance with evolution of next-generation mobile Internet, 2G, 3G, 4G, and B4G mobile communication wireless access networks will be co-existed and service providers will be merged as an integrated service provider. In addition, multiple virtual service operators will appear. In order to provide complicated unified-services, in the future Internet, wireless network virtualization where network resource is shared by various service operators is necessary. Therefore, in this paper, we investigate network architectures and virtualization scenarios for wireless access network virtualization where various wireless access technologies are flexibly operated by multiple service providers over next-generation wireless access networks. We expect that the virtualization scenario and network architecture yielded from this study can play a role as a basis for development of wireless access network virtualization algorithms.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.